SANS NewsBites

The Top 25 Critical Vulnerabilities are Being Exploited by the Chinese: NSA -- Patch Them Now

October 23, 2020  |  Volume XXII - Issue #84

Top of the News


2020-10-21

NSA: China is Exploiting These Vulnerabilities. Patch Now.

The US National Security Agency (NSA) has published a cybersecurity advisory listing 25 vulnerabilities that Chinese state-sponsored hackers are most frequently exploiting to gain access to computer networks of interest that hold sensitive intellectual property, economic, political, and military information. All 25 flaws are known and have fixes available.

Editor's Note

This report shows how nation state actors are using the same flaws everybody else is abusing to compromise networks. The list is led by flaws in perimeter security devices. These flaws have been heavily abused by ransomware gangs, crypto coin miners and essentially anybody interested in breaching a corporate network. A good reminder to review your vulnerability scans. If you find any of these 25 flaws included, assume that it has already been exploited. Even if you are not the target of Chinese nation state attackers.

Johannes Ullrich
Johannes Ullrich

While it is interesting to note that the list includes vulnerabilities from 2015 and 2018, dont look to the specific vulnerabilities exploited, look to the general cyber hygiene recommendations. Regularly patch and verify the security of products, replace old or obsolete products, use internal trusted or isolated management networks, block deprecated services at the perimeter, enabling logging, alerting and monitoring. Remember to validate systems for signs of compromise during the interval prior to update, and address any issues discovered.

Lee Neely
Lee Neely

Excellent resource.

Brian Honan
Brian Honan

2020-10-21

Oracle's Quarterly Patch Update Includes Fixes for More than 400 Vulnerabilities

Oracle has released its scheduled quarterly Critical Patch Update (CPU) for October 2020. The CPU includes fixes for more than 400 security flaws affecting multiple product lines. More than half of the vulnerabilities are remotely exploitable without authentication.

Editor's Note

This issue of NewsBites is chock-full of high criticality patches; this Oracle mega-patch is one of many on the server or appliance side of things. IT ops groups may be consumed by supporting large-scale Work From Home, with critical Exchange, VPN server and other actively exploited vulnerabilities staying unpatched and often unmitigated even longer than in past years. The item detailing the NSA warning is a good one to use to convince CIOs and upper management that providing sufficient change-window time right now needs to be a high priority.

John Pescatore
John Pescatore

These updates are spread across 27 products. The larger update interval Oracle uses provides for application of updates to business applications and services with less interruption and more regression testing. There are hopes that Oracle continues to grow, more frequent updates to commodity products will become available to reduce the number of updates released at each interval.

Lee Neely
Lee Neely

Expect another 400 or so next quarter. A quarterly schedule is more efficient for the maintainer but means that the vulnerabilities have a longer life, some longer than three months. 400 suggests a large reservoir of both known and unknown vulnerabilities.

William Hugh Murray
William Hugh Murray

2020-10-21

Google Patches Chrome Zero-day

Google has fixed a vulnerability in Chrome that was being actively exploited. The heap buffer overflow memory corruption flaw affects the FreeType font-rendering engine. The issue has been fixed in Chrome 86.0.4240.111. It has also been fixed in FreeType 2.10.4.

Editor's Note

The urgency is being driven by the active exploitation of the vulnerability. You should already be pushing this update out to your Mac, Windows and Linux systems. An update was also just released for ChromeOS and Android platforms (86.0.4240.112 and 86.0.4240.114 respectively) which systems will be receiving through the regular update process over the next several days. If you are using the non-browser embedded FreeType, push updates for that as well.

Lee Neely
Lee Neely

Browsers are notoriously porous because they are feature-rich and easily extensible. They should be routinely maintained and isolated from mission critical applications.

William Hugh Murray
William Hugh Murray

2020-10-21

Cisco Releases Fixes for Network Security Products

Cisco has released 17 advisories to address high-severity flaws in Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD), and Firepower Management Center (FMC). Most of the vulnerabilities can be exploited remotely without authentication to create denial-of-service conditions.

Editor's Note

While there is no current evidence of active exploitation, the DOS conditions, if enacted, require a device reboot to clear, making updating now a more attractive option.

Lee Neely
Lee Neely

The Rest of the Week's News


2020-10-21

WordPress Forces Update for Loginizer Plugin

WordPress has forced an update for the Loginizer plugin to address an unauthenticated SQL injection vulnerability. The flaw could be exploited to take over vulnerable sites. WordPress has had the ability to force plugin updates since 2013 but has rarely used the feature. The plugin is installed on more than one million sites; the issue is fixed in Loginizer 1.6.4.

Editor's Note

While WordPress has forced the update, deemed one of the most severe flaws in recent history by their security team, it's still prudent to validate that your WordPress installation has been updated. The issue is in the brute force login protection, which is enabled by default, that stores bad login username in the database. A malformed login, which includes SQL statements, is then stored in the database without sanitization, which allows for those statements to be executed without authentication.

Lee Neely
Lee Neely

2020-10-21

Adobe Releases Updates Outside of Schedule

Adobe has released updates to address critical flaws in 10 products, including Illustrator, Dreamweaver, After Effects, Photoshop, and the Creative Cloud Desktop application. All of the flaws could be exploited to allow arbitrary code execution. This is the second out-of-schedule round of fixes Adobe has released this month; last week, Adobe released fixes for flaws in its Magento ecommerce platform.

Editor's Note

These updates affect both the Windows and macOS products. Users with the Creative Cloud desktop app will be automatically updated; even so, verify the updated versions are deployed.

Lee Neely
Lee Neely

Out-of-schedule fixes suggest urgency and are often to vulnerabilities that are being actively exploited. Even though such fixes are expensive to the user, they deserve special attention.

William Hugh Murray
William Hugh Murray

2020-10-20

Adobe Content Attribution Tool in Preview

Adobe is offering a preview of a secure digital watermark technology, an attribution tool for Photoshop and Behance, to help identify images as real and to combat deepfake information. The tool will be available to select customers in pre-release within Photoshop and Behance within the coming weeks. The development of the tool is part of the larger Content Authenticity Initiative, a coalition of organizations working toward a common goal of building a system to provide provenance and history for digital media, giving creators a tool to claim authorship and empowering consumers to assess whether what they are seeing is trustworthy.

Editor's Note

Be sure that your copyright notice is included in the content so protected.

William Hugh Murray
William Hugh Murray

2020-10-21

Microsoft Doggedly Targets Trickbot Servers

The Trickbot botnet is being assailed from multiple angles. Earlier this month, Microsoft obtained a court order that allowed it to seize Trickbot servers operating within the US. Aware that the action was a temporary roadblock for the botnet, Microsoft has more recently been successful in efforts to seize Trickbot servers operating outside the US. US Cyber Command has also taken action to thwart Trickbot, and Europol has arrested 20 people in connection with laundering money for Trickbot operators.

Editor's Note

Kudos to all involved in these takedowns. We regularly hear that criminals are becoming more efficient and effective due to various groups working together. It is great to see those on the side of good working together to make life more difficult for criminals.

Brian Honan
Brian Honan

2020-10-22

EU Sanctions Russian Hackers

The Council of the European Union has imposed sanctions on Russian hackers for their roles in a 2015 cyberattack against Germany's Federal Parliament (Deutscher Bundestag). The sanctions impose travel bans and freeze assets. Additionally, EU organizations and individuals are prohibited from transferring funds to the sanctioned entities.


2020-10-22

FDA Approves Medical Device Cybersecurity Scoring Tool

The US Food and Drug Administration (FDA) has approved a rubric for assigning Critical Vulnerability Scoring System (CVSS) scores to vulnerabilities in medical devices. MITRE submitted its proposed rubric last year. The FDA has just announced that it has been approved as a Medical Device Development Tool (MDDT). Vendors can use this MDDT to communicate measurements from the rubric about their devices with the FDA for pre-market security and risk assessments.

Editor's Note

This creates a common language and terminology for discussion and publishing issues, which should help making assessment and risk acceptance decisions more consistent. Even so, the pure score has to be weighted with environmental factors relating to the ability of vulnerabilities to be exploited. When using those factors, regular validation is necessary to ensure they haven't been circumvented or bypassed.

Lee Neely
Lee Neely

Note that vendors *can* use this tool/approach, but the FDA is *not* requiring them to do so. I've been a big fan of the CVSS standard since V1 came out in 2005 or so. That same year, the FDA issued Guidance for Industry 1553 to the medical device industry, which removed barriers to medical equipment vendors rapidly issuing patches for vulnerabilities in their products because of FDA certification issues. In 2020, we are on V3 of the CVSS standard (which vendors originally fought) and CVSS has proven to be very useful but the medical device industry is pretty much where it was 15 years ago vulnerability-wise. We really need to see the FDA force progress in making medical devices safer just removing barriers has not been enough.

John Pescatore
John Pescatore

The attack surface of a medical device should be as limited as its application and environment permit. If it includes an operating system, it is already too big.

William Hugh Murray
William Hugh Murray

2020-10-21

Finnish Psychotherapy Data Held for Ransom

Vastaamo, a Finnish organization that provides psychotherapy to thousands of people across the country, says they have been contacted by an unknown hostile party claiming to have stolen patient data. Vastaamo has notified authorities about the incident.


2021-01-22

Sopra Steria's Network Suffers Cyberattack

French IT outsourcing firm Sopra Steria has been hit with a cyberattack. According to a regulatory statement, the company detected the attack on the evening of October 20. Reports suggest that the Sopra Steria network was infected with Ryuk ransomware, which was also used in the attack targeting Universal Health Services last month.

Internet Storm Center Tech Corner

Mirai-alike Python Scanner

https://isc.sans.edu/forums/diary/Miraialike+Python+Scanner/26698/


Shipping Dangerous Goods

https://isc.sans.edu/forums/diary/Shipping+dangerous+goods/26702/


BazarLoader Phishing Lures

https://isc.sans.edu/forums/diary/BazarLoader+phishing+lures+plan+a+Halloween+party+get+a+bonus+and+be+fired+in+the+same+afternoon/26710/


Google Chrome Update (actively exploited vulnerability fixed)

https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html


QNAP Fixes ZeroLogon Vulnerability

https://www.qnap.com/en/security-advisory/qsa-20-07


GravityRat Going Multi Platform

https://usa.kaspersky.com/about/press-releases/2020_infamous-gravity-rat-spyware-evolves-to-target-multiple-platforms


Chinese State-Sponsored Actors Exploit Same Vulnerabilities as Others

https://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF


US Census Spoof

https://assets.documentcloud.org/documents/20397864/fbi-flash-unattributed-entities-register-domains-10142020.pdf


URL Bar Spoofing Vulnerabilities

https://thehackernews.com/2020/10/browser-address-spoofing-vulnerability.html


Stalled Reviews for Secure Boot Shim

https://github.com/rhboot/shim-review/issues/120

https://github.com/rhboot/shim-review/issues/102#issuecomment-698963751


Oracle Quarterly Critical Patch Update

https://www.oracle.com/security-alerts/cpuoct2020.html


Cisco Advisories

https://tools.cisco.com/security/center/publicationListing.x